Author

Why does computer infrastructure security remain such a daunting subject? One reason may be the breadth of devices and service one must consider when designing and maintaining a good security posture. Here’s one example. Let’s say we are a large retailer and have a large online presence, including ecommerce. Let’s now think about our security […]